#EndpointDetectionandResponse

2025-06-06

Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation ToyBox Story)

APT37, a North Korean state-sponsored hacking group, launched a spear phishing campaign targeting activists focused on North Korea. The attack involved emails with Dropbox links to malicious LNK files, which when executed, activated additional malware. The group utilized legitimate cloud services as Command and Control servers, a tactic known as 'Living off Trusted Sites.' The malware, identified as RoKRAT, collected system information, captured screenshots, and exfiltrated data to cloud-based C2 servers. The campaign, named 'Operation: ToyBox Story,' employed sophisticated techniques including fileless attacks and multiple encryption layers to evade detection. The threat actors impersonated academic events and used decoy documents to lure targets, highlighting the need for advanced endpoint detection and response solutions.

Pulse ID: 6842cae27981f75e4a1e567f
Pulse Link: otx.alienvault.com/pulse/6842c
Pulse Author: AlienVault
Created: 2025-06-06 11:02:58

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APT37 #Cloud #CyberSecurity #Dropbox #Email #Encryption #Endpoint #EndpointDetectionandResponse #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #bot #AlienVault

Parliamo di news! ☑️parliamodinews@masthead.social
2022-11-15
heise online (inoffiziell)heiseonline@squeet.me
2021-10-28
heise+ | Endgerätesicherheit und EDR-Tools: Gefahren schnell erkennen und reagieren

Aus simplen Virenscannern sind komplexe Produkte zum Schutz der Endgeräte im Netz entstanden. Wir geben einen Überblick über den großen Markt der EDR-Tools.
Endgerätesicherheit und EDR-Tools: Gefahren schnell erkennen und reagieren
heise online (inoffiziell)heiseonline@squeet.me
2020-10-07
heise+ | IT-Sicherheit: Security Operations Center intern oder als Managed Service

Die Funktionen eines Security Operation Center sind für die Abwehr von Angriffen auf die Unternehmens-IT unverzichtbar. Dienstleister können hier unterstützen.
IT-Sicherheit: Security Operations Center intern oder als Managed Service
2019-12-30

Mean Time to Hardening: The Next-Gen Security Metric - Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours ... more: threatpost.com/mean-time-harde #endpointdetectionandresponse #cybersecuritymetrics #timetoexploitation #meantimetoharden #vulnerabilities #patchmanagement #infosecinsider #richardmelick #exploits #patching #automox #hacks #edr

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst